New York Times reported that a breach at facebook exposed data of up to 50 million users: Adversary.io has a good write-up regarding some of the details of the vulnerabilities involved. Why didn’t the researcher who found these vulnerabilities report it through...

Reading /r/netsec today, I happened to come across this recycled old 2017 blog post from Cisco security about detecting malware by applying machine learning to encrypted communications. Admittedly, it’s an interesting idea. At some point malware started using...

On Monday we became a tenant at the shared office provider WeWork. According to their website, “WeWork is a global network of workspaces where companies and people grow together.” We needed something more flexible while our new corporate office is being...

At Digital Operatives, sometimes our eyes are bigger than our stomach. We’re a small, focused security company trying to help the nation improve in cyber-security. Fundamentally though, we’re an “ideas” company. We come up with ideas, and as...

Every blog author should ask themselves at some point, who is the target audience for this blog post, website, or tool? Digital Operatives started out as a niche cyber-security company doing advanced research and development somewhat before the term...

How much vulnerability analysis can we automate? How complete, and reliable, are those results? How well can we even answer those questions? Digital Operatives has been exploring questions like these for quite a while and the answer may be “much less than you...

Q: Is this a cyber security story or a finance risk story? A: Both, financial and cyber risks are more related than ever. I’ve read about the reasons for owning Bitcoin, some of these were intuitive for me long before this was ever compiled. Back in 2012 when I...

Magiic was created in 2013 to help users securely index and search their PGP-encrypted email. It has been a while since Magiic was released and updated, and its original functionality of indexing only messages stored on a remote IMAP server did not serve...

What does a cult Brezhnev-era movie have to do with how exploit code finds its bearings in a Windows process’ address space? How can cryptographically insecure hashing functions be exploited to create honeypots that thwart shellcode? We researched this as a part of...